STRATEGIES INVOLVED IN REMOTE COMPUTATION

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

Server 2012 R2 Essentials - What’s new ? Bart #techninebe Technine Group.
1 Planetary Network Testbed Larry Peterson Princeton University.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Lecture 2: Servers and Services Network Design & Administration.
Understand Virtualized Clients Windows Operating System Fundamentals LESSON 2.4.
1 PUNCH PUNCH (Purdue University Network Computing Hubs) is a distributed network-computing infrastructure that allows geographically dispersed users to.
1 Pertemuan 13 Servers for E-Business Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi: >
OSGi: Open Services Gateway Initiative Richard Chapman 5 Sept
Distributed Database Management Systems
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Thirteen Performing Network.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
.NET Mobile Application Development Introduction to Mobile and Distributed Applications.
Chapter 2 Introduction to Systems Architecture. Chapter goals Discuss the development of automated computing Describe the general capabilities of a computer.
Distributed Systems: Client/Server Computing
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Terminal Services Terminal Services is the modern equivalent of mainframe computing, in which servers perform most of the processing and clients are relatively.
1 Chapter Overview Introduction to Windows XP Professional Printing Setting Up Network Printers Connecting to Network Printers Configuring Network Printers.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
File sharing. Connect the two win 7 systems with LAN card Open the network.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Linux Basics CS 302. Outline  What is Unix?  What is Linux?  Virtual Machine.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 4 Web technologies: HTTP, CGI, PHP,Java applets)
Chapter 7: Using Windows Servers to Share Information.
Introduction to Networking Concepts. Introducing TCP/IP Addressing Network address – common portion of the IP address shared by all hosts on a subnet/network.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Remote OMNeT++ v2.0 Introduction What is Remote OMNeT++? Remote environment for OMNeT++ Remote simulation execution Remote data storage.
A Cloud is a type of parallel and distributed system consisting of a collection of inter- connected and virtualized computers that are dynamically provisioned.
Cloud Computing. What is Cloud Computing? Cloud computing is a model for enabling convenient, on-demand network access to a shared pool of configurable.
Chapter 6 Operating System Support. This chapter describes how middleware is supported by the operating system facilities at the nodes of a distributed.
Lecture 3: Sun: 16/4/1435 Distributed Computing Technologies and Middleware Lecturer/ Kawther Abas CS- 492 : Distributed system.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Learningcomputer.com SQL Server 2008 Configuration Manager.
Database-Driven Web Sites, Second Edition1 Chapter 5 WEB SERVERS.
SUMA: A Scientific Metacomputer Cardinale, Yudith Figueira, Carlos Hernández, Emilio Baquero, Eduardo Berbín, Luis Bouza, Roberto Gamess, Eric García,
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Week 5 Lecture Distributed Database Management Systems Samuel ConnSamuel Conn, Asst Professor Suggestions for using the Lecture Slides.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Copyright © George Coulouris, Jean Dollimore, Tim Kindberg This material is made available for private study and for direct.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
Remote Desktop Services in Windows Server 2008 R2.
Types of Operating Systems
DISTRIBUTED SYSTEMS Principles and Paradigms Second Edition ANDREW S
Satisfy Your Technical Curiosity Specialists Enterprise Desktop -
Page 1 Printing & Terminal Services Lecture 8 Hassan Shuja 11/16/2004.
Microsoft Windows XP Professional
Network Servers Chapter 13 Release 16/7/2009. Chapter Objectives Describe Client-server and Peer to Peer network model Explain server Explain Domain.
Chapter 8 – Cloud Computing
Distributed Systems Unit – 1 Concepts of DS By :- Maulik V. Dhamecha Maulik V. Dhamecha (M.Tech.)
Linux Operations and Administration
File Transfer And Access (FTP, TFTP, NFS). Remote File Access, Transfer and Storage Networks For different goals variety of approaches to remote file.
CSC 480 Software Engineering Lecture 17 Nov 4, 2002.
HNC COMPUTING - Network Concepts 1 Network Concepts Network Concepts Network Operating Systems Network Operating Systems.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Planning Application Services Lesson 4. Deploying Application Servers Organizations supply their employees with computers so that they can get work done,
Claudio Grandi INFN Bologna Virtual Pools for Interactive Analysis and Software Development through an Integrated Cloud Environment Claudio Grandi (INFN.
Chapter 7: Using Windows Servers
Microsoft Windows NT 4.0 Authentication Protocols
CSC 480 Software Engineering
Oracle Solaris Zones Study Purpose Only
1. 2 VIRTUAL MACHINES By: Satya Prasanna Mallick Reg.No
Chapter 3: Windows7 Part 4.
Chapter 16: Distributed System Structures
Ch > 28.4.
Presentation transcript:

STRATEGIES INVOLVED IN REMOTE COMPUTATION

The Remote Computation System (RCS) Today many high performance computers are reachable over some network. However, the access and use of these computers is often complicated. This prevents many users to work on such machines. The Goal of the Remote Computation System (CS) is to provide easy access to modern parallel algorithms on supercomputers for the inexperienced user.

CONT…. Wide area computer networks have become a basic part of today's computing infrastructure. These networks connect a variety of machines, from workstations to supercomputers, presenting an enormous computing resource. Furthermore, sufficient software for solving problems in numerical linear algebra on high performance computers is around today.

Cont………. However, the access and the use of these computers and the software is often complicated. A major problem for the inexperienced user to exploit such high performance computers is that he has to deal with machine dependent low level details.

Cont……. The goal of this project is to make high performance computing accessible to scientists and engineers without the need for extensive training in parallel computing and allowing them to use resources best suited for a particular phase of the computation. Also, the emphasis is laid on algorithms for solving problems in numerical linear algebra, the concepts presented here are applicable to any high performance algorithms

Cont…. This goal shall be achieved with a remote computation system (RCS), which provides an easy-to-use mechanism for using computational resources remotely. The user's view of the RCS is that of an ordinary software library. The user calls RCS library routines (e.g. to solve a system of linear equations) within his program running on a workstation. In contrast to common libraries, the problem is not necessarily solved on the local workstation, but is dynamically allocated on an arbitrary machine in a given pool of computers, in order to minimize the response time.

Cont… Because RCS is called asynchronously, it allows distributed applications with several solvers running concurrently on different computer platforms. The Remote Computation System consists of two components A library of interface routines The run time system.

Cont…… The underlying computational software can be any existing scientific package such as LAPACK Before running a RCS application, the user first has to start up the RCS run time system. RCS is a single user system but multiple RCS applications are allowed per user to run concurrently. The server is the core of the RCS. Its task is to accept requests from user's application and to start an appropriate solver on a host in the pool.

Cont….. If the remote host is not specified by the user, the server selects the solver-host pair such that the response time is minimized Such a selection process has not yet been done in the context of a numerical library. In order to make of an optimal choice, the server needs information about The problems which RCS can solve The host computers in the pool and their characteristics such as number of processors etc.

Cont…… The available computational software (solvers) on each host and their characteristics. For instance, a theoretical model is required to assess its response time Dynamic parameters as the current workload on each host and the available communication bandwidth on the network.

Cont….. A daemon called monitor on each host is responsible for periodically measuring the dynamic parameters. All other information is static and is read from a configuration file at startup time.

Cont.. With Remote Desktop, you can have access to a Windows session that is running on your computer when you are at another computer. This means, for example, that you can connect to your work computer from home and have access to all of your programs, files, and network resources as though you were sitting at your computer at work.

Cont.. You can leave programs running at work and when you get home, you can see your work desktop displayed on your home computer, with the same programs running. You can keep your programs running and preserve the state of your Windows session while another user is logged on. When that user logs off, you can reconnect to your session in progress.

Cont.. To use Remote Desktop, you need: A computer ("host" computer) running Windows XP Professional with Service Pack 2 or Windows Server 2003 with Service Pack 2 ("remote" computer) with a connection to a local area network (LAN) or the Internet.

Cont.. A second computer ("client" computer) with access to the LAN via a network connection, modem, or virtual private network (VPN) connection. This computer must have Remote Desktop Connection installed. Appropriate user accounts and permissions.

THANK UU!!!!!!!!